HACS-workshop / spectre-mitigations
☆15Updated 7 years ago
Alternatives and similar repositories for spectre-mitigations
Users that are interested in spectre-mitigations are comparing it to the libraries listed below
Sorting:
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆60Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- ☆35Updated 8 years ago
- Checking that functions are constant time with Valgrind☆181Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- Code to fuzz bignum libraries☆45Updated 6 years ago
- ☆170Updated 4 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Source code of the Whitebox Contest Submission Server☆34Updated 9 months ago
- SCALE: Side-Channel Attack Lab. Exercises☆43Updated last year
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 8 years ago
- SGX command-line tools and paper☆146Updated 8 years ago
- Building Distributed Enclave Applications with Sancus and SGX☆13Updated 4 years ago
- ☆28Updated 3 years ago
- Slides and very basic examples☆111Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 2 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- An implementation of the IETF QUIC protocol in F*☆20Updated 5 years ago
- SIDH C reference implementation☆13Updated 8 years ago
- A microarchitectural leakage detection framework using dynamic instrumentation.☆73Updated 2 months ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Kernel Address Isolation to have Side-channels Efficiently Removed☆220Updated 3 years ago
- Picon☆39Updated 8 years ago
- Efficient TLS termination inside Intel SGX enclaves for existing applications☆105Updated 3 years ago
- This repository contains examples of Flush+Flush cache attacks☆163Updated 3 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆22Updated 8 years ago
- Minimal RISC Extensions for Isolated Execution☆52Updated 5 years ago